name |
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware)
|
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Multi-Function Devices
|
not_valid_before |
2018-04-03
|
2010-02-25
|
not_valid_after |
2023-04-03
|
2015-03-01
|
scheme |
DE
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Infineon Technologies AG
|
Ricoh Company, Ltd.
|
manufacturer_web |
https://www.infineon.com/
|
https://www.ricoh.com/
|
security_level |
ALC_FLR.1, EAL6+ |
ALC_FLR.2, EAL3+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0879V3c_pdf.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1™-200...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': None}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
52a2a3dce7d04b560a1f6d2be7fe2b85d022f7587357a1a6b33a68a24b302282
|
None
|
state/cert/txt_hash |
b81c7665198bd25bd15303b862333cd0435dd2172797bc86a23a7067b6b658af
|
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
7df3ce72df5a402ee7dd1b434497162f9c0b840f8bee3d16357beae2051d1203
|
7fa424b1dd452cb2c7793a3a8bece7e5e5410ba457ff44bb46ecb91b0d9d645f
|
state/report/txt_hash |
e25d350eb8ecfa0911c984a1c2a53c066cd9278285e5b2f526c168f43acd54b7
|
5710d2d89500845be1fd471294a614fc1a27e0cf8b667c6d9e0c0dd45701409c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
80b6285501f7c4326337d4782ae6f522567c6adbc6c6ada5c32a638f4492192e
|
4b88251809d96351ffcb5e2065b5c303a9dc0305316eec39aeae2ab7bd136885
|
state/st/txt_hash |
d7b08c9f5c2995c80702660a9626e220cb623cac113ca09413f26df4281162f1
|
e3085316072214aba0f74dd921d8747846705a1f62f96a828b9949928b327ab0
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0879-V3-2018
|
JISEC-CC-CRP-C0246
|
heuristics/cert_lab |
BSI |
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019 |
None
|
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0879-V2-2015 |
None
|
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0879-V5-2022, BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V6-2023, BSI-DSZ-CC-1071-V4-2020, BSI-DSZ-CC-1071-V5-2021, BSI-DSZ-CC-1071-V3-2020, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-0879-V4-2020, BSI-DSZ-CC-1084-2019, BSI-DSZ-CC-1071-V7-2023 |
None
|
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014, BSI-DSZ-CC-0879-V2-2015 |
None
|
heuristics/scheme_data |
None
|
- cert_id:
C0246
- supplier:
RICOH COMPANY, LTD.
- toe_overseas_name:
-----
- expiration_date:
2015-03
- claim:
EAL3+
ALC_FLR.2
PP
- certification_date:
2010-02
- toe_overseas_link:
None
- toe_japan_name:
Ricoh imagio MP 5000SP/4000SP
with security card Type 9
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1,
Network Support7.26,
Network DocBox1.10C,
Web Support1.59,
Web Uapl1.15, animation1.3,
Scanner01.24,
RPDL7.33,
Printer;1.11,
MSIS7.15.02,
RPCS Font1.01,
Engine1.04:05,
OpePanel1.01,
LANG01.01,
LANG11.01,
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- toe_japan_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
- enhanced:
- product:
Ricoh imagio MP 5000SP/4000SP with security card Type 9
- toe_version:
- Firmware Configuration
System VersionV2.16-00
System/Copy1.11.1
Network Support7.26
Network DocBox1.10C
Web Support1.59
Web Uapl1.15
animation1.3
Scanner01.24
RPDL7.33
Printer1.11
MSIS7.15.02
RPCS Font1.01
Engine1.04:05
OpePanel1.01
LANG01.01
LANG11.01
ADF15.000:15
- ASIC
Ic Key1100
- Option
Data Erase Opt1.01m
- product_type:
Multi Function Product
- certification_date:
2010-02-25
- cc_version:
3.1
- assurance_level:
EAL3 Augmented with ALC_FLR.2
- protection_profile:
2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
- vendor:
RICOH COMPANY, LTD.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0246_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0246_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0246_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions.
TOE security functionality
The main security functions are described as follows:
-
Audit Function: to generate / review audit log of the event.
-
Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout.
-
Access Control Function: to control available functions for each user, and to control the document operation.
-
Network Protection Function: to protect information on the Network with use of the encrypted communication.
-
Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data.
-
Security Management Function: to make the administrators control the security functions.
-
Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2019/04, BSI-DSZ-CC-1071-2019, BSI-DSZ-CC-1071-V2-2019, BSI-DSZ-CC-1084-2019 |
None
|
heuristics/st_references/directly_referencing |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
BSI-DSZ-CC-1071-2019, ANSSI-CC-2024/13, BSI-DSZ-CC-1071-V2-2019, ANSSI-CC-2019/04, BSI-DSZ-CC-1084-2019 |
None
|
heuristics/st_references/indirectly_referencing |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
0879V3c_pdf.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0879-V3-2018:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 6:
1
- EAL 5:
1
- EAL 2:
1
- EAL 6 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- Infineon:
- Infineon:
1
- Infineon Technologies AG:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
361225
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20180416135147+02'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, PP-0035, EAL6"
- /ModDate:
D:20180416143812+02'00'
- /Producer:
LibreOffice 5.2
- /Subject:
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware)
- /Title:
Certification Report BSI-DSZ-CC-0879-2018-V3
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
0879V3a_pdf.pdf
|
c0246_erpt.pdf
|
pdf_data/report_frontpage |
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0879-V3-2018
- cert_item:
Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware
- developer:
Infineon Technologies AG
- cert_lab:
BSI
- ref_protection_profiles:
Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
- cc_version:
PP conformant plus product specific extensions Common Criteria Part 2 extended
- cc_security_level:
Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0879-V3-2018:
20
- BSI-DSZ-CC-0879-:
1
- BSI-DSZ-CC-0879-V2-2015:
1
|
- JP:
- CRP-C0246-01:
1
- Certification No. C0246:
1
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.DOC:
2
- T.FUNC:
1
- T.PROT:
1
- T.CONF:
2
- A:
- A.ACCESS:
1
- A.USER:
1
- A.ADMIN:
2
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0035-2007:
2
- BSI-CC-PP- 0035-2007:
1
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 6:
5
- EAL 5:
4
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
- EAL 5+:
1
- EAL6:
3
- EAL6+:
3
- EAL 6 augmented:
3
- EAL6 augmented:
3
|
- EAL3:
3
- EAL3 augmented:
2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Security Target M7893 B11 Common Criteria CCv3.1 EAL6 augmented (EAL6+)”, Infineon Technologies AG (confidential document) [7] Evaluation Technical Report for BSI-DSZ-CC-0879-V3-2018, Version 3, 2017-10-23, “Evaluation:
1
- Report Summary (ETR Summary)”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9:
1
- “Evaluation Technical Report for Composite Evaluation (ETR Comp)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE of BSI-DSZ-CC-0879-V3-2018, Version 2.0, 2017-07- 25:
1
- with Evaluation Assurance Level EAL6 augmented (EAL6+) M7893 B11”, Infineon Technologies AG (confidential document) [12] SLE70 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox User Interface (2.03.008:
1
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
4
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- physical probing:
1
- SPA:
3
- DPA:
3
- FI:
- physical tampering:
1
- DFA:
3
- other:
|
|
pdf_data/report_keywords/side_channel_analysis/FI |
- physical tampering:
1
- DFA:
3
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 31:
3
- AIS 36:
3
- AIS 35:
2
- AIS 1:
1
- AIS 14:
1
- AIS 19:
1
- AIS 20:
1
- AIS 23:
1
- AIS 32:
1
- AIS 37:
1
- AIS 38:
1
- AIS 41:
1
- AIS 45:
1
- AIS 46:
1
- AIS 47:
1
- ISO:
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
|
- CC:
- CCMB-2006-09-001:
2
- CCMB-2007-09-002:
2
- CCMB-2007-09-003:
2
- CCMB-2007-09-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Infineon:
- Infineon:
25
- Infineon Technologies AG:
8
- Infineon Technologies:
1
- GD:
- G&D:
1
- Giesecke & Devrient:
1
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
858784
- pdf_is_encrypted:
False
- pdf_number_of_pages:
31
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20180416135130+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies AG, SmartCard, PP-0035, EAL6"
- /ModDate:
D:20180416143909+02'00'
- /Producer:
LibreOffice 5.2
- /Subject: Infineon Security Controller M7893 B11 with optional RSA2048/4096 v2.03.008 or v1.03.006, EC v2.03.008 or v1.03.006, SHA-2 v1.01, SCL v2.02.010 libraries and Toolbox v2.03.008 or v1.03.006 and with specific IC dedicated software (firmware)
- /Title:
Certification Report BSI-DSZ-CC-0879-2018-V3
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte
|
- pdf_file_size_bytes:
230440
- pdf_is_encrypted:
False
- pdf_number_of_pages:
29
- /ModDate:
D:20100629170727+09'00'
- /CreationDate:
D:20100629170727+09'00'
- /Title:
untitled
- /Producer:
Acrobat Distiller 6.0 (Windows)
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20180416135130+02'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//ModDate |
D:20180416143909+02'00'
|
D:20100629170727+09'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 5.2
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0879-2018-V3
|
untitled
|
pdf_data/report_metadata/pdf_file_size_bytes |
858784
|
230440
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierungsreporte |
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
31
|
29
|
pdf_data/st_filename |
0879V3b_pdf.pdf
|
c0246_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.DOC:
18
- O.FUNC:
9
- O.PROT:
9
- O.CONF:
18
- O.USER:
21
- O.INTERFACE:
9
- O.SOFTWARE:
9
- O.AUDIT:
9
- T:
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
- A:
- A.ACCESS:
5
- A.USER:
4
- A.ADMIN:
10
- OE:
- OE.AUDIT_STORAGE:
4
- OE.AUDIT_ACCESS:
3
- OE.INTERFACE:
4
- OE.PHYSICAL:
1
- OE.USER:
21
- OE.ADMIN:
8
- OE.AUDIT:
3
- OE.AUDIT_ACCESS_AUTHORIZED:
1
- OE.PHYISCAL:
3
|
pdf_data/st_keywords/cc_claims/O |
|
- O.DOC:
18
- O.FUNC:
9
- O.PROT:
9
- O.CONF:
18
- O.USER:
21
- O.INTERFACE:
9
- O.SOFTWARE:
9
- O.AUDIT:
9
|
pdf_data/st_keywords/cc_claims/T |
|
- T.DOC:
10
- T.FUNC:
5
- T.PROT:
5
- T.CONF:
10
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_SPM: 2
- ADV_ARC.1:
1
- ADV_FSP.5: 3
- ADV_IMP.2: 2
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ADV_SPM.1: 6
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_FSP: 1
- ADV_FSP.4: 4
- ADV_CMC.5: 1
|
- ADV_ARC.1:
1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS: 1
- ALC_FLR.1: 11
- ALC_DVS.2: 3
- ALC_CMC.5: 2
- ALC_CMS.5: 3
- ALC_DEL.1:
1
- ALC_LCD.1:
1
- ALC_TAT.3: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMC: 1
- ALC_CMC.4: 1
|
- ALC_FLR.2: 3
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1:
1
- ALC_DVS.1: 2
- ALC_LCD.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_INT: 1
- ASE_CCL: 1
- ASE_SPD: 1
- ASE_OBJ: 1
- ASE_ECD: 1
- ASE_REQ: 1
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
- ASE_TSS: 1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2:
1
- ATE_COV: 1
- ATE_COV.2:
3
|
- ATE_COV.2:
1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 |
3
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL6:
8
- EAL6+:
125
- EAL4+:
1
- EAL 6:
1
- EAL6 augmented:
4
- EAL 6 augmented:
1
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG.1:
14
- FCS_RNG:
4
- FCS_COP:
119
- FCS_CKM:
81
- FCS_RNG.1.1:
2
- FCS_RNG.1.2:
2
- FCS_COP.1:
33
- FCS_CKM.4:
39
- FCS_CKM.1:
43
- FCS_CKM.2:
6
- FDP:
- FDP_ITT.1:
18
- FDP_IFC.1:
17
- FDP_ACC.1:
24
- FDP_ACF.1:
21
- FDP_SDI.1:
16
- FDP_SDI.2:
14
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1:
34
- FDP_ITC.2:
34
- FDP_SDI.1.1:
1
- FDP_SDI.2.1:
2
- FDP_SDI.2.2:
2
- FMT:
- FMT_LIM:
2
- FMT_LIM.1:
6
- FMT_LIM.2:
7
- FMT_MSA.1:
19
- FMT_MSA.3:
20
- FMT_SMF.1:
16
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_CKM.4:
1
- FPT:
- FPT_TST.2:
35
- FPT_TST:
3
- FPT_TST.1:
12
- FPT_TST.2.1:
2
- FPT_FLS.1:
19
- FPT_PHP.3:
25
- FPT_ITT.1:
18
- FPT_AMT.1:
1
- FRU:
|
- FAU:
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
- FDP:
- FDP_IFF:
1
- FDP_IFC:
1
- FDP_ACF.1:
27
- FDP_ACC.1:
29
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP.1:
6
- FDP_RIP.1.1:
1
- FDP_IFC.1:
4
- FIA:
- FIA_AFL.1:
8
- FIA_UAU.7:
7
- FIA_SOS.1:
8
- FIA_UAU.1:
14
- FIA_UID.1:
17
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
9
- FIA_ATD.1.1:
1
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.1:
7
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FMT:
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1:
11
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_FDI_EXP:
4
- FPT_FDI_EXP.1:
11
- FPT_FDI_EXP.1.1:
2
- FPT_STM.1:
9
- FPT_TST.1:
6
- FPT_STM.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTA:
- FTA_SSL.3:
10
- FTA_SSL.3.1:
1
- FTP:
- FTP_ITC.1:
18
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TST.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS.1:
10
- FAU_SAS:
4
- FAU_GEN:
1
- FAU_SAS.1.1:
1
|
- FAU_STG.1:
9
- FAU_STG.4:
8
- FAU_SAR.1:
10
- FAU_SAR.2:
7
- FAU_GEN.1:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
6
- FAU_GEN.2.1:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3:
1
- FAU_STG.4.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_SAR.2.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ITT.1: 18
- FDP_IFC.1:
17
- FDP_ACC.1:
24
- FDP_ACF.1:
21
- FDP_SDI.1: 16
- FDP_SDI.2: 14
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_ITC.1: 34
- FDP_ITC.2: 34
- FDP_SDI.1.1: 1
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
|
- FDP_IFF: 1
- FDP_IFC: 1
- FDP_ACF.1:
27
- FDP_ACC.1:
29
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_IFC.1:
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
24
|
29
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
21
|
27
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
17
|
4
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 2
- FMT_LIM.1: 6
- FMT_LIM.2: 7
- FMT_MSA.1:
19
- FMT_MSA.3:
20
- FMT_SMF.1:
16
- FMT_SMR.1:
6
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1.1:
1
- FMT_CKM.4: 1
|
- FMT_SMF.1:
20
- FMT_SMR.1:
26
- FMT_MSA.3:
24
- FMT_MSA.1:
23
- FMT_MSA.1.1:
2
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
19
|
23
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
20
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
16
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
6
|
26
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_TST.2: 35
- FPT_TST: 3
- FPT_TST.1:
12
- FPT_TST.2.1: 2
- FPT_FLS.1: 19
- FPT_PHP.3: 25
- FPT_ITT.1: 18
- FPT_AMT.1: 1
|
- FPT_FDI_EXP: 4
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 9
- FPT_TST.1:
6
- FPT_STM.1.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
12
|
6
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement:
3
- Key agreement:
2
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256:
8
- SHA-512:
2
- SHA-2:
70
- MD:
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
11
- Physical Probing:
2
- physical probing:
1
- side channel:
7
- SPA:
5
- DPA:
7
- FI:
- Malfunction:
9
- DFA:
6
- fault induction:
1
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Malfunction:
9
- DFA:
6
- fault induction:
1
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 197:
2
- FIPS PUB 180-4:
4
- FIPS PUB 197:
3
- FIPS PUB 800-38:
2
- NIST:
- SP 800-67:
3
- SP 800-38A:
6
- PKCS:
- BSI:
- RFC:
- RFC3447:
4
- RFC 5639:
2
- RFC 3447:
1
- ISO:
- ISO/IEC 18092:
2
- ISO/IEC 7816-3:
1
- ISO/IEC 9797-1:
4
- ISO/IEC 10118-3:
3
- ISO/IEC 18033-3:
3
- ISO/IEC 11770-3:
3
- ISO/IEC 14888-:
1
- ISO/IEC 15946-1:
1
- ISO/IEC 14888-3:
1
- ISO/IEC 15946-2:
1
- ISO/IEC 15946-3:
1
- CC:
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
1
|
- CC:
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
2
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
1
|
- CCMB-2006-09-001:
1
- CCMB-2007-09-002:
1
- CCMB-2007-09-003:
1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- DES:
- 3DES:
- TDES:
33
- Triple-DES:
2
- TDEA:
1
- constructions:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Infineon:
- Infineon Technologies AG:
33
- Infineon Technologies:
8
- Infineon:
6
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1643326
- pdf_is_encrypted:
False
- pdf_number_of_pages:
124
- /Title:
Security Target Lite
- /Author:
Dr. Oleg Rudakov
- /Subject: Security Target M7893 B11 Integrity Guard
- /Keywords: Dresden, contactless, multi interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL6+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, libraries, CCv3.1, PP0035, DCLB, ACLB, USB, GPIO 90nm
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20171025172601+02'00'
- /ModDate:
D:20171025172601+02'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/
|
- pdf_file_size_bytes:
464939
- pdf_is_encrypted:
False
- pdf_number_of_pages:
65
- /CreationDate:
D:20100618152326+09'00'
- /Author:
- /Creator:
PScript5.dll Version 5.2.2
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20100618152326+09'00'
- /Title:
Microsoft Word - C0246ST_eng_2010-6-18.doc
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Dr. Oleg Rudakov
|
|
pdf_data/st_metadata//CreationDate |
D:20171025172601+02'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
PScript5.dll Version 5.2.2
|
pdf_data/st_metadata//ModDate |
D:20171025172601+02'00'
|
D:20100618152326+09'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
Acrobat Distiller 7.0.5 (Windows)
|
pdf_data/st_metadata//Title |
Security Target Lite
|
Microsoft Word - C0246ST_eng_2010-6-18.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
1643326
|
464939
|
pdf_data/st_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/, http://www.bsi.bund.de/, http://www.infineon.com/ |
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
124
|
65
|
dgst |
f5eb065df94ceda9
|
93cdda41b5a03cdf
|